CVE-2026-35052

D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to 3.22.0, users hosting D-Tale publicly while using a redis or shelf storage layer could be vulnerable to remote code execution allowing attackers to run malicious code on the server. This vulnerability is fixed in 3.22.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:man:d-tale:*:*:*:*:*:*:*:*

History

20 Apr 2026, 18:36

Type Values Removed Values Added
First Time Man
Man d-tale
CPE cpe:2.3:a:man:d-tale:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/man-group/dtale/security/advisories/GHSA-436g-fhfc-9g5w - () https://github.com/man-group/dtale/security/advisories/GHSA-436g-fhfc-9g5w - Vendor Advisory

06 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 18:16

Updated : 2026-04-20 18:36


NVD link : CVE-2026-35052

Mitre link : CVE-2026-35052

CVE.ORG link : CVE-2026-35052


JSON object : View

Products Affected

man

  • d-tale
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

NVD-CWE-noinfo